Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.802021
Category:Web application abuses
Title:WordPress Is-human Plugin 'passthru()' Function RCE Vulnerability
Summary:WordPress Is-human Plugin is prone to a remote command execution (RCE) vulnerability.
Description:Summary:
WordPress Is-human Plugin is prone to a remote command execution (RCE) vulnerability.

Vulnerability Insight:
The flaws are caused by improper validation of user-supplied
input to the 'passthru()' function in 'wp-content/plugins/is-human/engine.php',
which allows attackers to execute commands in the context of an affected site.

Vulnerability Impact:
Successful exploitation will let remote attackers to execute
malicious commands in the context of an affected site, also remote code execution is possible.

Affected Software/OS:
Is-human WordPress plugin version 1.4.2 and prior.

Solution:
No known solution was made available for at least one year
since the disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective
features, remove the product or replace the product by another one.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

CopyrightCopyright (C) 2011 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.